Executive Viewpoints

Co-Founder and Sr. Director Products

VeloCloud (now part of VMware)

Many enterprises are looking for ways to decrease the strain on their wide area network (WAN) architecture. Traditional hub and spoke network designs simply can’t meet the rigorous demands of cloud and mobile computing and the need to provide good user experiences for people in branch and remote locations. Organizations are finding a flexible solution…

Chief Strategy Officer

Digital Guardian

There are a handful of steps, many common sense, that companies should take following a data breach. Naturally, following an established remediation plan, understanding what happened, and initiating an investigation around a breach are critical incident response steps. Adopting a data-centric frame of mind when it comes to security shouldn’t be too far down a…

Head of Product

Centrify

As 2018 is upon us, it’s time to take stock of our new realities and commit to better behavior that benefits us and our companies. The discussion of the perimeterless enterprise is not new. In fact, the term “de-perimeterisation” was coined by Jon Measham, a former employee of the UK’s Royal Mail in a research paper, and subsequently…

VP of Product Management

Arxan

It’s still early in 2018, and we’ve already been hit with one of the widest-reaching security flaws of all time. What makes the recent Spectre vulnerability a serious problem is the fact that it has been in place for 20 years and is the result of optimization for performance. While there are no known, documented…

Chief Strategist, Next Gen Endpoint

Sophos

As cybersecurity matures as an industry, network defenders understand that preventing attack, while best case, is not foolproof. However, just because an adversary compromises a machine does not mean the battle is lost. In fact, it has just begun. In this article, I’ll describe how evolving your cybersecurity strategy from singleton instance detection to detecting…

Co-founder and CEO

Aqua Security

When my company launched in October 2015, few security folks even knew what software containers were. We might as well have been securing shipping containers! Development and DevOps teams, on the other hand, already were enthusiastically embracing software containers because of the speed and agility they bring to the application delivery process. Plus, containers enabled…

VP & Co-founder

Demisto

At first glance, the Watch Dogs video games seem like far-fetched fantasy, depicting a world of constant surveillance, ubiquitous hackability, and authorities eavesdropping on citizens to prevent crimes before they happen. But the more you peer beneath the covers, the more you realize how close the games are to reality and the more you see…

VP, Engineering

Cavirin Systems

Creating secure software and systems has never been more challenging. An explosion in the number of devices that hook into company data, coupled with increased mobility and a shift to cloud services and storage, has dramatically increased the potential attack surface of most organizations. More than 9 billion data records have been lost or stolen…

Co-founder and Chief Technology Officer

Contrast Security

Founder & CEO

Dover Microsystems

All of our critical computing devices have a Jar Jar Binks processor. That is, they have little common sense, they’re easy to manipulate, and they’re unable to distinguish good from bad. Just like the floppy-eared version in Star Wars, Jar Jar Binks processors are well-meaning but incredibly easy to trick. This is exactly what allows…